Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
fc65b8ad35327cf5a3347554a105a894_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc65b8ad35327cf5a3347554a105a894_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc65b8ad35327cf5a3347554a105a894_JaffaCakes118.html
-
Size
1KB
-
MD5
fc65b8ad35327cf5a3347554a105a894
-
SHA1
be887f428027dd05609f887df32ca138cb0c1386
-
SHA256
263af808f431423fc55959163a0147d63b4cdc0d49ef92e4c8e92c40433a0d5a
-
SHA512
559428449fee6c08d347a69a64f8f43a75e8bb503bf7e00edf12750f0ca558a5ceaf611ab54d118daaeb256a6b3083044fee5af5833ec4ce8030ab79fc21ce4c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000026c5044e3f1cbbfd9ff07d01cf31ffdb42129ed9724ae55d1839e0b3bfd21479000000000e800000000200002000000083a9e32544a5e34ab1cf4fed5b2b4f4fc037b0e574668d2b4fa244d128a370752000000035075bdf4726a6a975ed1ad3a602f488c18673ad7b9a4f682fa956b8ac8374ea40000000cd48ce1d95defb843e8312274dbb24334a634b3ac4174b2d0379a7038ac09824dec2bb46db88e8af80b484c01fceea708ab801cd9b34ecf14856736648e572b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00097a70aa11db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433691978" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DBD17A1-7D9D-11EF-A7A5-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1868 iexplore.exe 1868 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2520 1868 iexplore.exe 30 PID 1868 wrote to memory of 2520 1868 iexplore.exe 30 PID 1868 wrote to memory of 2520 1868 iexplore.exe 30 PID 1868 wrote to memory of 2520 1868 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc65b8ad35327cf5a3347554a105a894_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1868 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e297bf12d0e403b3bd6f8a69f443d84
SHA1ebd4664c960ee460302027682a091ebc75b0f1e7
SHA256f7cd1e1935dd5513831060d0ab730f4862bba6c50cf74f3a58646e0d60298325
SHA512fb8899e1f5bc5b66e8ceb03b7b6cd1eec7b10693853cbcbfd7dcdf599a1bcb41588ee71bfaa41bef5b5a7353b9a9081e662cb554e26318626fca28da059ed6b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c59a9eda4bb3ba482612a6f49f33a0af
SHA1b306ab89b43d23217fad975ecfc698aa201fabe2
SHA2560d6b615d69844b3513091745823d57c71ba77ff684f9fe7187aef0828385d511
SHA512dfaf97cda5284b989ad3da64ecc2918bc5ac7517aad5fc84d2a7fa7a081aecfe7a0502229d0b774ce5d48eb6de40b0d36c8d701ab77919be2dcd9ff2339c51e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a72bf8c37009dce590728af0785812
SHA1d218ba950e66e5a5a480b2aa5d47d5f0d9bc421c
SHA256a867e5beec5486cff14d585359a85c1af4d35579608e241a10d37056e314d6ae
SHA51293159b7344ed967a7c4fdac5a0c23be75094b79f4eb6172c30817af65d89edade9d487ff736b3e0b9511e4c9dbc78d3dab4a9787f6772191d30ba28e9585d480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5968959b005d08f80ff829e9ac12fc5cd
SHA1f1dd1fb62f1831a55cdf20b1dc0f8a7ad9524146
SHA2569ee2a3591c8670fc8cb19124520b2ca436693a69717c0d1e9e78ec1c9a786613
SHA512e37ab667addb5e4af3fed781d48075bbd0e0bf258745be4a7ded67aa7c0436118237ff17e25c2256d4f23899a32ef2d19fcfbb2595749213870efe1605173e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf9f8de24ecb7335aac4352c8adf87f
SHA109f67ab4ca8c68efb98a55d4cb12a444bb3e43c4
SHA256922585088bb2e5b269b72de9452fba6783d17f39da4fcdcee2609cdb5f6dc55b
SHA512e68b41e00962c261411593ec10a4f85b2678f8da12065fa273beacdf4efd6a2966fb83e7ed4a92cb5d52ed92d235c6c88e5a1180d607b32114777c7712540d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4b97e1c5d85c8a4b8e28438bd400ab
SHA1462f8f18cb9a5ee373554dc1b4ad2a1d2ef118c6
SHA256f6ba8b3d16c8ed648cea51f6501f18bdc18add34dba11810bdd6b0a4b94d2ef3
SHA51283f5b2c770ab852b1acb1ae007160408d2f2aa14643a91fed713fb0e9461f0d5060f3589e80c937cd6e864f5e4549b976aacb4b78fcdf2cebb431c441936ece8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe2b1a142160449af38bb6d65d2ac3a9
SHA1327a0c4243d9cdc9678aede5e7b4a604ca2c865b
SHA256edd89962d6cf40d1583455e25cd60d38a85b866844e2f53409bd31801b3d9564
SHA512aa030c1b3fc8702a775b4e8058601e8f4a07b724df0eb46370227fba9287bd22079725d451c11bf99d93dcbb42a9704b3850ec94d5c4ee80427fbe9a6c9a8e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58923500cfa7c3b6ed8a7458549451317
SHA1c711d08e8050a51fdc1177d213cb739bfc3b4f57
SHA256d3271bef60b1193c80ebefa1f72dfe8ccf9ae0ee29248912ce7146f35277a3f6
SHA512f2610242a057a74adccff7844ad19cd952b923ead42857d004a272779696ec8c83184ede3c3bd75589a718b5a878cbc3c260dd5eceb7cb63d5457155bd2ad736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591814e0b6f8798475239fc8a54a7e98e
SHA100cc694321985a714f66f7062b30b00c782eaf2a
SHA256c123a5ad7d43d4a365f6c1adf80e77002eee638b9a48f5f9725944a549628cd4
SHA512716e46bf63e5db4199749585adf1c14808decc4ce3ae4091f0e988751616b76d7c5dd7937d3e7da66c88666b594bb5e6943983d01d04e95a8a8ab0a521e82e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc9c318304fdb21306fe63938ede140
SHA1e13d7d2fdbed4d5ccb0f6891a36cbebdb06f9e78
SHA2568dd03d7958d4ae461c949f7986cbc3b4bb5cbb19c95782664323d5be128b5800
SHA51288359fbf9d5ffb4f3a532fb0a3f49c5b671130747f5458eab3fb26738a1b388fece9b02ad43c624ab621d68a993cb4c9e4d32575c96757c229e2f59d073372e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35c913059aec62f936caf682b40314c
SHA12a87d923cfaef8930f868721041aabf5b46b339e
SHA25688fd82f1c5ab5bfb299ca4d63b44a789f7427519f8a980c97cd784e54c5d1a2e
SHA5126447a9ffa1141e0d535c471dd3518d86dc5c821d850723042f899af4ecf66beb3c8c7620258a01275883c6f636ed5ac1912dde64ad76f53552ace00ddb9aea29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a7024c622d1da807322e98790a15d9
SHA1d522305b68a244fac566d5226c9593c6ad0ece33
SHA256e78db101d97b077106c50003bd5d65172a01725b1da8a3cfd7f6d8dd68e7db1d
SHA512f40e69abc19f7f0cf9979fb225f2309a2f6d27977cee9d02bb91f7329b26d8c3ebb9b9f5d0b4a57416be2aef65552c9645d97b22c2d36862e82386518c67d477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bedd4abe6c2e6768ad74471d450e99
SHA1ab6e1936c832b815502067b61bd3a1a308d1b6e3
SHA256f06006c3a7cff686b3d692ea04372f8113a5bfe3caa7b06adf64708bcf14914e
SHA5125fe5c0ffbbc991fdfa9f3803fef54eb3ebb1e627a93fd3fc3f64aaa2228234bcee90bd67f3f450abfc7ad80ddf28a2bc2fb0760933cf1016edcc6eb90c7f8759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca5499df9ebfb8b45029d9bf3b3e624
SHA1d0b471058e95c6b79d6bd7d80144eba7c41c917d
SHA256de6bf82d12515fb925ca1747c07a5ca4b199fad1c05b584d4780aad3a1b3f494
SHA512b7c3c6082ddb8881e0f603db78746d45f97405b2ada963888605affa68802d47a9907b29716f23d4baf72de7d5efce10d645aae6ad2e63b78111c0af18588937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512cd7b0b5d2acf0a941c2851caf0276d
SHA1b0339ffd203a5ff60039f60cf0a80916ddd30986
SHA256d2fd56f421eb96c320ba1fa7419c81c3ebdddcac85223486af304c489ee2ef95
SHA512eafb73cc5d07f350c29d01b6777e4345e39748d366f44c9dac7f1838c06ae257562922f59af05b18dcb3d837fd863c3ac397deefd4e71b5a8e53d5cf46603c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abd97b393cfa86d507b17e4e0fbf06c4
SHA11adec15ac5af308ef7db8370d52991f032c04081
SHA256a1cca0aeb72bbb8586386df5e7441ab957c90b254f7d5e2906c0e1d9963a34b0
SHA512638da44fe2cdce75268f14caba8f32a53c5bdc17e531b6a7ff0cabf6f95a2a0804a0f6b1b60a58d76b4801e89319a6e911f4ad29a81989b8ab249a7ea42bf206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb39e72adea598557513a86223b3d2a7
SHA1a29c070457a46b7f1faa1deab377165d467152d6
SHA256a8e20f471e4fb35d3bdd630bdb19fdca44d6c63587e51d6bf794ef0c9a478c27
SHA512a04a68e35465f9b366c0fdf59f6c84db94defba11cb839aea765f1c02676622fc953254e748cf7f75994331c9e675b8691f6f4fc8dd2e72583867e4d1241dd44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b894e610fd836d0e696a944bd4e1084
SHA113447adfdc170dd97fe46ee1b20a22e06b548042
SHA25640ddc03173229621c788a552d5623ebd2e969bd38443ce31eaafdefd4a2ff3f2
SHA512bf215c3155965ae15f73833d726f9a348285e282bdf3d356b616dfb007681fcdbbe1c40239628faaa24343c032caf8b1891acf932ebbaefe5d4ef9eb0fb639d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c956cbf54d2d7ff4977c498c97c4863f
SHA19646a3209c1f9752a68818bba0951ded248a149c
SHA25698a347b9c2469d4d195fe4f53a45dcec6b080cf3096f46a6fa9631936f992ed3
SHA5125c072c0c215cf03e6f3160c2a0ebd5a0ab423cce4df8678c8e638929d157ec8514aad4cdf4087a778736ee1bbeb9d46b194e99fbe3f9b20d22c9b57e9b3473bc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b